Overview
Prometheus is a strategic planning agent that creates detailed work plans through iterative questioning. Named after the Greek Titan who brought fire (knowledge) to humanity, Prometheus embodies foresight, strategic thinking, and meticulous planning.
Purpose: Generate comprehensive, actionable work plans through interview-style clarification before implementation begins.
model
string
default:"claude-opus-4-6"
Default model with extended thinking for strategic planning
Internal planning agent, not directly user-facing
Low temperature for consistent, structured planning
Extended thinking budget for complex planning scenarios{
"type": "enabled",
"budgetTokens": 32000
}
Model Configuration
Default Model (Claude)
{
"model": "claude-opus-4-6",
"variant": "max",
"thinking": {
"type": "enabled",
"budgetTokens": 32000
}
}
GPT Variant
When using GPT models:
{
"model": "gpt-5.2",
"variant": "high",
"reasoningEffort": "high"
}
Gemini Variant
When using Gemini models:
{
"model": "gemini-3.1-pro",
"variant": "high"
}
Fallback Chain
Prometheus has a quality-focused fallback chain:
anthropic/claude-opus-4-6 (variant: max)
openai/gpt-5.2 (variant: high)
Can edit plan files (.md only, enforced by prometheus-md-only hook)
Can run commands for codebase investigation
Can fetch external documentation during planning
Can ask clarifying questions via OpenCode’s QuestionTool
Prometheus is a planning-only agent:
- Cannot write new files (only edit plan markdown)
- Cannot delegate to other agents
- Cannot execute implementation work
- Focused solely on plan generation
Core Capabilities
1. Interview Mode
Prometheus uses iterative questioning to clarify requirements:
## Interview Phase
I need to understand a few things before creating the plan:
1. **Architecture preference**: Do you want to use REST or GraphQL for the API?
- Impact: Affects endpoint structure and data fetching patterns
- Default: I'll assume REST based on existing codebase patterns
2. **Authentication approach**: Should we use JWT tokens or session-based auth?
- Impact: Changes security model and client-side storage
- Recommendation: JWT for stateless API
3. **Database migration**: Should I plan for backward-compatible schema changes?
- Impact: Determines migration strategy and rollback complexity
- Risk: Breaking changes require coordinated deployment
2. Plan Generation
Generates detailed, structured plans in markdown format:
# Feature: User Authentication System
## Overview
Implement JWT-based authentication with role-based access control.
## Prerequisites
- [ ] Review existing user model
- [ ] Check for existing auth middleware
- [ ] Verify bcrypt installation
## Implementation Tasks
### Phase 1: Core Authentication
- [ ] **T1.1**: Create JWT token service (`src/services/auth/token.ts`)
- Generate access tokens (15min expiry)
- Generate refresh tokens (7day expiry)
- Token validation and decoding
- [ ] **T1.2**: Implement auth middleware (`src/middleware/auth.ts`)
- Extract token from Authorization header
- Validate token signature
- Attach user to request object
- Handle expired tokens
### Phase 2: User Endpoints
- [ ] **T2.1**: POST /api/auth/register
- Validate email format and password strength
- Hash password with bcrypt
- Create user record
- Return access + refresh tokens
- [ ] **T2.2**: POST /api/auth/login
- Verify credentials
- Return tokens
- [ ] **T2.3**: POST /api/auth/refresh
- Validate refresh token
- Issue new access token
### Phase 3: Testing
- [ ] **T3.1**: Unit tests for token service
- [ ] **T3.2**: Integration tests for auth endpoints
- [ ] **T3.3**: E2E test for full auth flow
## Risk Mitigation
### Security
- Store JWT secret in environment variable
- Use httpOnly cookies for refresh tokens
- Implement rate limiting on auth endpoints
- Add CSRF protection
### Performance
- Cache token validation results (Redis)
- Use short access token expiry
- Implement token blacklist for logout
## Verification Checklist
- [ ] All tests passing
- [ ] Security review completed
- [ ] Documentation updated
- [ ] API documented in Swagger/OpenAPI
3. High Accuracy Mode
Thinking budget allows deep analysis:
- Explores multiple implementation approaches
- Identifies edge cases and failure modes
- Maps dependencies between tasks
- Estimates complexity and risk
- Proposes mitigation strategies
4. Plan Template System
Uses structured templates for consistency:
- Overview: High-level summary
- Prerequisites: Pre-work and validations
- Implementation Tasks: Phased breakdown with detailed steps
- Risk Mitigation: Security, performance, reliability considerations
- Verification Checklist: Success criteria
Planning Process
Phase 1: Requirement Gathering
- Parse user request: Extract explicit requirements
- Identify implicit needs: Infer unstated requirements
- Detect ambiguities: Find areas needing clarification
- Formulate questions: Ask targeted clarifying questions
Phase 2: Codebase Analysis
- Search for patterns: Find similar existing implementations
- Check dependencies: Identify required libraries/services
- Assess impact: Understand which systems are affected
- Identify constraints: Note architectural limitations
Phase 3: Plan Construction
- Break down tasks: Create atomic, trackable work items
- Order dependencies: Sequence tasks logically
- Estimate complexity: Tag each task with effort estimate
- Add verification: Define success criteria for each phase
- Document risks: Note potential issues and mitigations
Phase 4: Review & Refinement
- Completeness check: Verify all requirements covered
- Clarity check: Ensure tasks are actionable
- Risk assessment: Validate mitigation strategies
- Final review: User approval before handoff to Atlas
Plan File Structure
Plans are saved to .sisyphus/plans/{name}.md:
.sisyphus/
└── plans/
├── user-authentication.md
├── dark-mode-implementation.md
└── api-rate-limiting.md
Each plan follows this structure:
# {Feature Name}
## Overview
{High-level summary}
## Prerequisites
- [ ] {Prerequisite task 1}
- [ ] {Prerequisite task 2}
## Implementation Tasks
### Phase 1: {Phase Name}
- [ ] **T1.1**: {Task description}
{Task details}
### Phase 2: {Phase Name}
...
## Risk Mitigation
### {Risk Category}
- {Mitigation strategy 1}
- {Mitigation strategy 2}
## Verification Checklist
- [ ] {Verification item 1}
- [ ] {Verification item 2}
Usage Examples
Example 1: Feature Planning
// User invokes Prometheus via /start-work or explicitly
// Request: "Plan implementation of file upload feature with S3"
// Prometheus: Interview mode
"I need clarification on a few points before creating the plan:
1. **File size limits**: What's the maximum file size we should support?
- Affects multipart upload strategy
- Recommendation: 100MB for standard, 5GB for large files
2. **Access control**: Should uploaded files be public or private?
- Public: Direct S3 URLs
- Private: Pre-signed URLs with expiry
3. **File types**: Any restrictions on allowed file types?
- Security consideration: Prevent executable uploads
4. **Storage strategy**: Should we organize files by user, date, or type?
- Affects S3 bucket structure and retrieval patterns"
// User provides answers
// Prometheus generates detailed plan
"Plan saved to .sisyphus/plans/file-upload-s3.md
✓ 3 phases identified
✓ 12 atomic tasks defined
✓ 5 security mitigations documented
✓ 8 verification criteria established
Ready to execute with /start-work file-upload-s3"
Example 2: Refactoring Plan
// Request: "Create a plan to refactor the payment processing module"
// Prometheus: Analysis phase
"Analyzing existing payment module structure..."
// Searches codebase for payment-related code
// Identifies current architecture
"Found payment logic spread across:
- src/services/payment/stripe.ts (Stripe integration)
- src/services/payment/paypal.ts (PayPal integration)
- src/routes/checkout.ts (Mixed business logic)
- src/utils/currency.ts (Scattered helpers)
Key issues identified:
1. No abstraction over payment providers
2. Business logic mixed with API routes
3. Missing error recovery patterns
4. No audit logging
Proposed approach: Payment Strategy Pattern
- Abstract payment provider interface
- Centralize business logic in service layer
- Add comprehensive error handling
- Implement audit trail"
// Generates comprehensive refactoring plan
"Plan saved to .sisyphus/plans/payment-refactor.md
✓ 4 phases (Extract, Abstract, Test, Migrate)
✓ 15 tasks with detailed steps
✓ Backward compatibility maintained
✓ Rollback strategy documented"
Behavioral Guidelines
Thoroughness Over Speed
Prometheus prioritizes complete, accurate planning:
- Takes time to understand requirements fully
- Asks clarifying questions without hesitation
- Explores edge cases and failure scenarios
- Documents assumptions explicitly
Structured Communication
All plans follow consistent structure:
- Clear phase separation
- Atomic, testable tasks
- Explicit dependencies
- Concrete verification criteria
Risk-Aware Planning
Every plan includes risk assessment:
- Security implications
- Performance impact
- Data migration risks
- Backward compatibility concerns
- Rollback strategies
Integration with Atlas
Prometheus plans are executed by Atlas orchestrator:
# 1. Generate plan with Prometheus
/start-work "implement user authentication"
# Prometheus creates .sisyphus/plans/user-authentication.md
# 2. Execute plan with Atlas
# Atlas reads the plan file
# Delegates tasks to appropriate agents/categories
# Tracks progress via todos
# Verifies completion
Configuration
Customize Prometheus in oh-my-opencode.jsonc:
{
"agents": {
"prometheus": {
"model": "anthropic/claude-opus-4-6",
"variant": "max",
"temperature": 0.1,
"thinking": {
"type": "enabled",
"budgetTokens": 32000
},
"prompt_append": "Additional planning guidelines...",
"disable": false
}
}
}
Best Practices
Ask clarifying questions - Don’t assume requirements
Break down into atomic tasks - Each task should be independently completable
Document assumptions - Make implicit requirements explicit
Include verification criteria - Define what “done” means
Assess risks proactively - Identify potential issues before implementation
Never skip interview phase - Incomplete requirements lead to flawed plans
Never create vague tasks - Each task must be concrete and actionable
Never ignore edge cases - Document failure scenarios and mitigations
- Atlas - Executes Prometheus plans via systematic orchestration
- Metis - Pre-planning analysis and requirement clarification
- Momus - Reviews and validates plans for completeness
- Sisyphus - Can invoke Prometheus for complex planning needs